From mboxrd@z Thu Jan 1 00:00:00 1970 X-Msuck: nntp://news.gmane.org/gmane.linux.lib.musl.general/1969 Path: news.gmane.org!not-for-mail From: John Spencer Newsgroups: gmane.linux.lib.musl.general,gmane.linux.sabotage.general Subject: sabotage linux i386 image released Date: Fri, 21 Sep 2012 04:56:51 +0200 Message-ID: <505BD773.7080206@barfooze.de> Reply-To: musl@lists.openwall.com NNTP-Posting-Host: plane.gmane.org Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-Trace: ger.gmane.org 1348195785 10024 80.91.229.3 (21 Sep 2012 02:49:45 GMT) X-Complaints-To: usenet@ger.gmane.org NNTP-Posting-Date: Fri, 21 Sep 2012 02:49:45 +0000 (UTC) To: musl@lists.openwall.com, sabotage@lists.openwall.com Original-X-From: musl-return-1970-gllmg-musl=m.gmane.org@lists.openwall.com Fri Sep 21 04:49:49 2012 Return-path: Envelope-to: gllmg-musl@plane.gmane.org Original-Received: from mother.openwall.net ([195.42.179.200]) by plane.gmane.org with smtp (Exim 4.69) (envelope-from ) id 1TEtJK-0007iU-9a for gllmg-musl@plane.gmane.org; Fri, 21 Sep 2012 04:49:46 +0200 Original-Received: (qmail 24301 invoked by uid 550); 21 Sep 2012 02:49:41 -0000 Mailing-List: contact musl-help@lists.openwall.com; run by ezmlm Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: Original-Received: (qmail 24291 invoked from network); 21 Sep 2012 02:49:41 -0000 User-Agent: Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.9.2.14) Gecko/20110221 SUSE/3.1.8 Mail/1.0 Xref: news.gmane.org gmane.linux.lib.musl.general:1969 gmane.linux.sabotage.general:14 Archived-At: I uploaded an i386 image file of my latest sabotage build from https://github.com/rofl0r/sabotage it comes with about 200 packages. X11 is installed, but for some reason non-functional. the startx scripts seems to have trouble to cooperate with the busybox hostname tool. the base system itself can be considered quite stable and moderately well tested at the moment. there are likely some security patches missing, but the kernel used is grsec patched. so if you intend to use gdb you may have to override some ptrace settings using paxctl. (or build your own kernel with grsec disabled, see /src/pkg/kernel) root password is sabotage dont forget to read README in github repo Image files are available at http://mirror.wzff.de/sabotage/ http://mirror.wzff.de/sabotage/sabotage-0.9.6-i386_84870b5d.img.xz ca 150 MB sha512 checksum 852ec7f406b60e2f06b98de5c87f4b9735d0a9245da9f8e5a3a3f7471a449020641aad342df369962cde9b9a36376097e38b6beeb3b3f9d68e89d61d1648f2b2 unpack using xzcat (extracts to a 4GB imagefile) launch using qemu-system-x86_64 imagefile or alternatively convert to virtualbox format using VBoxManage convertfromraw $IMG $VDI if you use virtual box, you may have to change /bin/X to use different device ids (currently commented out) you can also loopmount the image and copy the rootfs from there there's also a rootfs for armv7l/softfp available. kernel is not included, because the kernel has to be carefully adapted to each specific ARM device its intended to run on.